Growing community of inventors

Linz, Austria

Harald Schütz

Average Co-Inventor Count = 5.27

ph-index = 5

The patent ph-index is calculated by counting the number of publications for which an author has been cited by other authors at least that same number of times.

Forward Citations = 86

Harald SchützKenneth D Ray (17 patents)Harald SchützAnthony John Merry (12 patents)Harald SchützAndreas Berger (10 patents)Harald SchützAndrew James Thomas (9 patents)Harald SchützRussell Humphries (6 patents)Harald SchützJohn Edward Tyrone Shaw (6 patents)Harald SchützDaniel Salvatore Schiappa (5 patents)Harald SchützMark David Harris (4 patents)Harald SchützSimon Neil Reed (2 patents)Harald SchützNeil Robert Tyndale Watkiss (2 patents)Harald SchützRobert Wendell Cook (2 patents)Harald SchützGordon Sullivan (2 patents)Harald SchützMarkus Hein (1 patent)Harald SchützGerald Wintersberger (1 patent)Harald SchützNorbert Gruber (1 patent)Harald SchützArtur Wenzel (1 patent)Harald SchützHarald Schütz (17 patents)Kenneth D RayKenneth D Ray (175 patents)Anthony John MerryAnthony John Merry (12 patents)Andreas BergerAndreas Berger (14 patents)Andrew James ThomasAndrew James Thomas (134 patents)Russell HumphriesRussell Humphries (43 patents)John Edward Tyrone ShawJohn Edward Tyrone Shaw (13 patents)Daniel Salvatore SchiappaDaniel Salvatore Schiappa (29 patents)Mark David HarrisMark David Harris (55 patents)Simon Neil ReedSimon Neil Reed (22 patents)Neil Robert Tyndale WatkissNeil Robert Tyndale Watkiss (18 patents)Robert Wendell CookRobert Wendell Cook (12 patents)Gordon SullivanGordon Sullivan (2 patents)Markus HeinMarkus Hein (3 patents)Gerald WintersbergerGerald Wintersberger (3 patents)Norbert GruberNorbert Gruber (1 patent)Artur WenzelArtur Wenzel (1 patent)
..
Inventor’s number of patents
..
Strength of working relationships

Company Filing History:

1. Sophos Limited (17 from 366 patents)


17 patents:

1. 11716351 - Intrusion detection with honeypot keys

2. 11089056 - Intrusion detection with honeypot keys

3. 10979449 - Key throttling to mitigate unauthorized file access

4. 10834061 - Perimeter enforcement of encryption rules

5. 10691824 - Behavioral-based control of access to encrypted content by a process

6. 10686827 - Intermediate encryption for exposed content

7. 10681078 - Key throttling to mitigate unauthorized file access

8. 10657277 - Behavioral-based control of access to encrypted content by a process

9. 10650154 - Process-level control of encrypted content

10. 10628597 - Just-in-time encryption

11. 10558800 - Labeling objects on an endpoint for encryption management

12. 10516531 - Key management for compromised enterprise endpoints

13. 10263966 - Perimeter enforcement of encryption rules

14. 10063373 - Key management for compromised enterprise endpoints

15. 9984248 - Behavioral-based control of access to encrypted content by a process

Please report any incorrect information to support@idiyas.com
idiyas.com
as of
1/3/2026
Loading…